【24h】

A CYBER-SECURITY STORM MAP

机译:一个网络安全风暴地图

获取原文

摘要

When a cyber-security event occurs, a person has to answer the following questions: what events are happening; where are the events occurring; and how much damage has occurred or will occur. This paper recommends a cyber-security monitoring system that provides correlation of time-series event data, a visual representation of the security events, and gives a predictive forecast of potential events based on known environmental states. The rationale for this comes from the need to have an overall view of security events or storms that are occurring on a network while providing information in reference to severity and a propagation pattern. Thus, it can potentially provide an early warning so that events or storms can be proactively mitigated. In addition, it can help in making business decisions by determining or understanding the relationship between the computing devices and the business/information technology services they make up.
机译:当发生网络安全事件时,一个人必须回答以下问题:发生了哪些事件;发生的事件在哪里;并发生了或将发生多少伤害。本文建议一个网络安全监测系统,提供时间序列事件数据,安全事件的视觉表示的相关性,并给出了基于已知环境态的潜在事件的预测预测。这是由于在网络提供信息的同时提供网络上发生的安全事件或风暴的总体观点,这是一段完整的安全事件或暴风雨。因此,它可能提供预警,以便可以主动减轻事件或风暴。此外,它可以通过确定或了解他们构成的计算设备和业务/信息技术服务之间的关系来帮助制定业务决策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号